General
-
Target
5bd07877dfc90482632cc43e3bee0c51d1afd52202e862f22e3d4af4b08dc8f6.exe
-
Size
262KB
-
Sample
250121-wnhz8swkc1
-
MD5
927c6d4643486b1651636e48cecf380b
-
SHA1
7ec5a7b99457f6727aee71bfd2fc2e9416ea476c
-
SHA256
5bd07877dfc90482632cc43e3bee0c51d1afd52202e862f22e3d4af4b08dc8f6
-
SHA512
d16b8a5d906f71d643881584ca6e8220f4aefb646bf6bd2f784f6b6a0026adc0f91ecf87d7cd12c2890c6dd7ec1243c3221c3691e450b3e2cb4dc3df0e91ce55
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/eU:WFzDqa86hV6uRRqX1evPlwAr
Static task
static1
Behavioral task
behavioral1
Sample
5bd07877dfc90482632cc43e3bee0c51d1afd52202e862f22e3d4af4b08dc8f6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5bd07877dfc90482632cc43e3bee0c51d1afd52202e862f22e3d4af4b08dc8f6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
5bd07877dfc90482632cc43e3bee0c51d1afd52202e862f22e3d4af4b08dc8f6.exe
-
Size
262KB
-
MD5
927c6d4643486b1651636e48cecf380b
-
SHA1
7ec5a7b99457f6727aee71bfd2fc2e9416ea476c
-
SHA256
5bd07877dfc90482632cc43e3bee0c51d1afd52202e862f22e3d4af4b08dc8f6
-
SHA512
d16b8a5d906f71d643881584ca6e8220f4aefb646bf6bd2f784f6b6a0026adc0f91ecf87d7cd12c2890c6dd7ec1243c3221c3691e450b3e2cb4dc3df0e91ce55
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/eU:WFzDqa86hV6uRRqX1evPlwAr
Score10/10-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-